Sciweavers

1403 search results - page 136 / 281
» Security Model for XML Data
Sort
View
LISA
2004
13 years 11 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...
ICDAR
2003
IEEE
14 years 3 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst
BIRTHDAY
2010
Springer
13 years 9 months ago
Specifying and Verifying Organizational Security Properties in First-Order Logic
In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell–La Padula. We show t...
Christoph Brandt, Jens Otten, Christoph Kreitz, Wo...
IANDC
2008
140views more  IANDC 2008»
13 years 10 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
CPM
2004
Springer
144views Combinatorics» more  CPM 2004»
14 years 3 months ago
A Simple Optimal Representation for Balanced Parentheses
We consider succinct, or highly space-efficient, representations of a (static) string consisting of n pairs of balanced parentheses, that support natural operations such as findi...
Richard F. Geary, Naila Rahman, Rajeev Raman, Venk...